Question 2 (15 points) Approximately 15 mins
Scenario 2
A company has asked you to undertake a risk management assessment of the laptops and mobile phones that the company's staff uses for work. A security consultant has outlined five possible threat actors as:
1) Criminals, 2) Cyber criminals, 3) Hardware failure, 4) Hard surfaces, 5) Cups of tea
Question 2.1 (5 points)
For each threat actor, list at least 1 vulnerability that if exploited, may result in an impact on the organisation
Question 2.2 (10 points)
For each risk, list possible controls that you could use to treat the risk. For each control, state the control type and control function.